Displaying 1 to 15 from 15 results

node-oidc-provider - OpenID Provider(OP) implementation for node

  •    Javascript

oidc-provider is an OpenID Provider implementation of OpenID Connect. It allows to export a complete mountable or standalone OpenID Provider implementation. This implementation does not dictate a fixed data models or persistence store, instead, you must provide adapters for these. A generic in memory adapter is available to get you started as well as feature-less dev-only views to be able to get off the ground. The following specifications are implemented by oidc-provider. Note that not all features are enabled by default, check the configuration section on how to enable them.

passport-azure-ad - Azure Active Directory Authentication Strategies using Node and Passportjs

  •    Javascript

passport-azure-ad is a collection of Passport Strategies to help you integrate with Azure Active Directory. It includes OpenID Connect, WS-Federation, and SAML-P authentication and authorization. These providers let you integrate your Node app with Microsoft Azure AD so you can use its many features, including web single sign-on (WebSSO), Endpoint Protection with OAuth, and JWT token issuance and validation. passport-azure-ad has been tested to work with both Microsoft Azure Active Directory and with Microsoft Active Directory Federation Services.

node-openid-client - A Relying Party(RP) implementation for node

  •    Javascript

openid-client is a server side OpenID Relying Party (RP, Client) implementation for Node.js, supports passport. The following client/RP features from OpenID Connect/OAuth2.0 specifications are implemented by openid-client.




oidc-auth-manager - An OpenID Connect (OIDC) authentication manager (OP, RP and RS) for decentralized peer-to-peer authentication

  •    Javascript

An OpenID Connect (OIDC) peer node (a combination Identity Provider, Relying Party, Authorization Server and Resource Server) for decentralized authentication projects such as Solid.

konfigurator - CLI Tool to generate Kubernetes kubeconfig files using oidc tokens

  •    Go

This tool generates a kubeconfig file with the OpenID Connect token authentication, allowing a user to use kubectl with OIDC configured clusters.

dexter - dexter is a Kubernetes OIDC helper with as much automation as possible

  •    Go

dexter is a OIDC (OpenId Connect) helper to create a hassle-free Kubernetes login experience powered by Google as Identity Provider. All you need is a properly configured Google client ID & secret. dexter will open a new browser window and redirect you to Google. The only interaction you have is the login at Google and your k8s config is updated automatically.


auth0-xamarin-oidc-samples - Auth0 OIDC Client with Xamarin applications

  •    CSharp

This repository contains all the samples for the Auth0 Xamarin Quickstart. Please refer to the README files in the individual folders for more information.

oidconnect-laravel - The OpenIDConnect Laravel package is meant to provide you an opportunity to easily authenticate users using OpenID Connect protocol

  •    PHP

The OpenIDConnect Laravel package is meant to provide you an opportunity to easily authenticate users using OpenID Connect protocol. Open config/app.php and register the required service providers above your application providers.

aws-credentials-broker - AWS Credentials Broker - Grants temporary AWS credentials for Google federated users

  •    Go

Assuming you already have a SAML provider & roles setup for Google federated users. You need to add a trust relationship for out Google Client ID.

account-sdk-browser - Schibsted Account SDK for browsers

  •    Javascript

Welcome! This is the home of the Schibsted account JavaScript SDK for use by any website that wishes to use Schibsted account to sign up and log in users. Use it to generate URLs for your site's "Log in" button, query the logged-in status of your users, and to check whether they have access to products and subscriptions, etc.

oidc-agent - oidc-agent for managing OpenID Connect tokens on the command line

  •    C

oidc-agent is a tool to manage OpenID Connect tokens and make them easily usable from the command line. We followed the ssh-agent design, so users can handle OIDC tokens in a similiar way as they do with ssh keys. oidc-agent is usually started in the beginning of an X-session or a login session. Through use of environment variables the agent can be located and used to handle oidc tokens.

k8s-pixy-auth - k8s plugin to authenticate against an OIDC compatible issuer using PKCE (pixy) flow

  •    Go

As of Kubernetes v1.11 there is beta support for a client-go credentials plugin. Using the support it is possible to use an Auth0 application to authenticate users and provide tokens with which a correctly configured Kubernetes cluster can authorize user actions. At this point in the project installation is manual. In the future this will be automated.